Contact/About US

We have a proven method of testing networks. Depending on your budget we can do a Vulnerability Assessment, or full fledged Red-Team attack. Both methods have its place. Penetration tests only prove we can get in. We don't find and touch all exploits. An assessment is what will tell you all the problems we found and how to remediate them. When doing a Penetration test the attacker doesn't want to alert administrators that they are being attacked.

So here is the phases we go through when doing a penetration test:

So if you are looking for a Penetration test or Assessment make sure you use a company that knows what they are doing.

It is amazing that in many cases a company has invested huge sums of money into their network security and at the same time they fail to adequately secure their doors. We have visited and audited sites that have easily picked locks, bypass motion sensor released door systems, and door hinges on the outside.

Password security? Is this a strange question? By their very nature, aren't passwords secure? Not exactly. Over time passwords have become more and more elaborate so that they are secure. First case sensitive did the trick. Then you had to have a minimum number of characters. Next, there were numbers. The special characters were required. Now passwords require all of the above. Unfortunately, with the CPU and RAM power available today no password is secure anymore, even those with mixed cases, numbers, special characters and thirteen digits.